Preferred Language
Articles
/
CBajHooBVTCNdQwCmJE8
Carbon-13 Characterization and Modelling for Temperature Measurement-Based Proton Frequency
...Show More Authors

The physical substance at high energy level with specific circumstances; tend to behave harsh and complicated, meanwhile, sustaining equilibrium or non-equilibrium thermodynamic of the system. Measurement of the temperature by ordinary techniques in these cases is not applicable at all. Likewise, there is a need to apply mathematical models in numerous critical applications to measure the temperature accurately at an atomic level of the matter. Those mathematical models follow statistical rules with different distribution approaches of quantities energy of the system. However, these approaches have functional effects at microscopic and macroscopic levels of that system. Therefore, this research study represents an innovative of a wireless temperature sensor, which utilizes proton resonance frequency of carbon-13 isotope material. In addition to that, this study also addresses the energy distribution of the particles by selecting an updated appropriate approach that has interesting points of limitation in the number of degree of freedom: (1) thermodynamically limits and (2) theoretical statistical thermodynamics observations. Lastly, the main idea of this paper is to visualize the analysis of temperate in the nanoscale system via statistical thermodynamics approach along with the material characterization of carbon-13 isotope.

Scopus Crossref
View Publication
Publication Date
Mon Jan 01 2024
Journal Name
Communications In Computer And Information Science
Automatic Identification of Ear Patterns Based on Convolutional Neural Network
...Show More Authors

Biometrics represent the most practical method for swiftly and reliably verifying and identifying individuals based on their unique biological traits. This study addresses the increasing demand for dependable biometric identification systems by introducing an efficient approach to automatically recognize ear patterns using Convolutional Neural Networks (CNNs). Despite the widespread adoption of facial recognition technologies, the distinct features and consistency inherent in ear patterns provide a compelling alternative for biometric applications. Employing CNNs in our research automates the identification process, enhancing accuracy and adaptability across various ear shapes and orientations. The ear, being visible and easily captured in

... Show More
View Publication
Scopus Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Svu-international Journal Of Engineering Sciences And Applications
Water Quality Detection using cost-effective sensors based on IoT
...Show More Authors

Crossref (4)
Crossref
Publication Date
Mon Aug 01 2022
Journal Name
Mathematics
Face Recognition Algorithm Based on Fast Computation of Orthogonal Moments
...Show More Authors

Face recognition is required in various applications, and major progress has been witnessed in this area. Many face recognition algorithms have been proposed thus far; however, achieving high recognition accuracy and low execution time remains a challenge. In this work, a new scheme for face recognition is presented using hybrid orthogonal polynomials to extract features. The embedded image kernel technique is used to decrease the complexity of feature extraction, then a support vector machine is adopted to classify these features. Moreover, a fast-overlapping block processing algorithm for feature extraction is used to reduce the computation time. Extensive evaluation of the proposed method was carried out on two different face ima

... Show More
View Publication
Scopus (33)
Crossref (27)
Scopus Clarivate Crossref
Publication Date
Sat May 01 2021
Journal Name
Journal Of Physics: Conference Series
Image Steganography using Dynamic Threshold based on Discrete Cosine Transform
...Show More Authors

The art of preventing the detection of hidden information messages is the way that steganography work. Several algorithms have been proposed for steganographic techniques. A major portion of these algorithms is specified for image steganography because the image has a high level of redundancy. This paper proposed an image steganography technique using a dynamic threshold produced by the discrete cosine coefficient. After dividing the green and blue channel of the cover image into 1*3-pixel blocks, check if any bits of green channel block less or equal to threshold then start to store the secret bits in blue channel block, and to increase the security not all bits in the chosen block used to store the secret bits. Firstly, store in the cente

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (6)
Scopus Crossref
Publication Date
Sun Jun 30 2013
Journal Name
Al-khwarizmi Engineering Journal
Estimated Outlet Temperatures in Shell-and-Tube Heat Exchanger Using Artificial Neural Network Approach Based on Practical Data
...Show More Authors

The objective of this study is to apply Artificial Neural Network for heat transfer analysis of shell-and-tube heat exchangers widely used in power plants and refineries. Practical data was obtained by using industrial heat exchanger operating in power generation department of Dura refinery. The commonly used Back Propagation (BP) algorithm was used to train and test networks by divided the data to three samples (training, validation and testing data) to give more approach data with actual case. Inputs of the neural network include inlet water temperature, inlet air temperature and mass flow rate of air. Two outputs (exit water temperature to cooling tower and exit air temperature to second stage of air compressor) were taken in ANN.

... Show More
View Publication Preview PDF
Publication Date
Fri Jul 01 2016
Journal Name
Colloids And Surfaces A: Physicochemical And Engineering Aspects
Stability and thermophysical properties of water-based nanofluids containing triethanolamine-treated graphene nanoplatelets with different specific surface areas
...Show More Authors

tA novel synthesis procedure is presented for preparing triethanolamine-treated graphene nanoplatelets(TEA-GNPs) with different specific areas (SSAs). Using ultrasonication, the covalently functionalizedTEA-GNPs with different weight concentrations and SSAs were dispersed in distilled water to prepareTEA-GNPs nanofluids. A simple direct coupling of GNPs with TEA molecules is implemented to synthesizestable water-based nanofluids. The effectiveness of the functionalization procedure was validated by thecharacterization and morphology tests, i.e., FTIR, Raman spectroscopy, EDS, and TEM. Thermal conduc-tivity, dispersion stability, and rheological properties were investigated. Using UV–vis spectrometer, ahighest dispersion stability of 0.876

... Show More
Crossref (93)
Crossref
Publication Date
Sat Aug 30 2025
Journal Name
Iraqi Journal Of Science
A Face Mask Detection Method in the Era of the COVID-19 Pandemic Based on GLCM and YOLO
...Show More Authors

In recent decades, the identification of faces with and without masks from visual data, such as video and still images, has become a captivating research subject. This is primarily due to the global spread of the Corona pandemic, which has altered the appearance of the world and necessitated the use of masks as a vital measure for epidemic prevention. Intellectual development based on artificial intelligence and computers plays a decisive role in the issue of epidemic safety, as the topic of facial recognition and identifying individuals who wear masks or not was most prominent in the introduction and in-depth education. This research proposes the creation of an advanced system capable of accurately identifying faces, both with and

... Show More
View Publication
Scopus Crossref
Publication Date
Sun Dec 30 2018
Journal Name
Journal Of Global Pharma Technology
Employing the Physicochemical, Spectroscopy, Antimicrobial and Antifungal Efficacy Studies of P-Hydroxy Acetophenone Based Azo Schiff Base Complexes
...Show More Authors

The azo Schiff base [Reaction of 4-aminoanypyrine and P-hydroxy acetophenone] and O-Phenylene diamine have been prepared. One azo Schiff base chelate of Co(Il), Ni(II), Cu(II) and Zn(II)ion was also prepared. The chemical frameworks of the azo Schiff base and like elemental analyses (CHN), determinations of molar conductance, 1 H &13C NMR, IR mass and electronic spectroscopy .The elemental analyses exhibited the combination of [L: M] 1:1 ratio. Established on the values IR spectral, it is showed that the azo Schiff base compound acts as neutral hexadentate ligand bonded with the metal ion from two hydroxyl, two azomethine and two azo groups of the azo Schiff base compound in chelation was confirmed by IR , 1Hand 13CNMR spectral outco

... Show More
Scopus (3)
Scopus
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF
Publication Date
Sun Feb 25 2024
Journal Name
Baghdad Science Journal
Efficient Task Scheduling Approach in Edge-Cloud Continuum based on Flower Pollination and Improved Shuffled Frog Leaping Algorithm
...Show More Authors

The rise of edge-cloud continuum computing is a result of the growing significance of edge computing, which has become a complementary or substitute option for traditional cloud services. The convergence of networking and computers presents a notable challenge due to their distinct historical development. Task scheduling is a major challenge in the context of edge-cloud continuum computing. The selection of the execution location of tasks, is crucial in meeting the quality-of-service (QoS) requirements of applications. An efficient scheduling strategy for distributing workloads among virtual machines in the edge-cloud continuum data center is mandatory to ensure the fulfilment of QoS requirements for both customer and service provider. E

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (2)
Scopus Crossref